A variety of information security threats

被引:0
|
作者
Kovalenko, Kseniya E. [1 ]
Kovalenko, Natalia E. [1 ]
Leon Gonzalez, Jorge Luis [2 ]
机构
[1] Altai State Univ, Barnaul, Russia
[2] Univ Cienfuegos Carlos Rafael Rodriguez, Cienfuegos, Cuba
来源
REVISTA UNIVERSIDAD Y SOCIEDAD | 2019年 / 11卷 / 05期
关键词
Information technologies; threat; computers; telecommunications systems;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent years, computer technology has been closely integrated into our lives. The life of modern society is inconceivable without modern information technologies. Computers serve banking systems, control the operation of nuclear reactors, distribute energy, monitor the schedule of trains, control spacecraft, etc. Computer networks and telecommunications predetermine the reliability and strength of the country's defense and security systems. Computers provide storage of information, its processing and provision to consumers, thereby realizing information technology. The availability and wide dissemination of information technologies, computers make them extremely vulnerable to destructive influences. Thus, the threat to information security is one of the most important problems of modern human life and we need to know where it comes from and how we can protect ourselves.
引用
收藏
页码:256 / 261
页数:6
相关论文
共 50 条
  • [1] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [2] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [3] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [4] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [5] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [6] EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS
    Masrek, Mohamad Noorman
    Soesantari, Tri
    Khan, Asad
    Dermawan, Aang Kisnu
    INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY, 2020, 21 (03): : 1203 - 1214
  • [7] INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS
    Genic, Sandro
    Hutinski, Zeljko
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2007, 31 (01) : 51 - 61
  • [8] Enemy at the gate: Threats to information security
    Whitman, ME
    COMMUNICATIONS OF THE ACM, 2003, 46 (08) : 91 - 95
  • [9] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [10] Classification of security threats in information systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    Ben Aissa, Anis
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 489 - 496